Figma
Reportes bug bounty en figma.
Last updated
Reportes bug bounty en figma.
Last updated
Hi Bruno, could you please review my report again carefully this time? During an assessment of a Figma workspace, we identified a severe exposure of Personally Identifiable Information (PII). This data leakage includes email addresses of multiple users, which falls under the category of PII according to various legal regulations, including GDPR, CCPA. This vulnerability makes it simple for an attacker to filter thousands of internal emails from legitimate figma users, which allows them to create entire spear phishing campaigns against the leaked emails in order to lure users into the trap and attack figma as a company. Now figma's image is currently at risk, as I was able to find emails from universities in the United States, from users employed by DELL, so this is something to be sanitized. What is this URL and its purpose? The URL https://www.figma.com/invites/auth is used by Figma to manage invitations and authentication for files, teams, and projects shared within the platform. In this flow, when entering an email in the following URL:
Access the Figma workspace with public/shared access.
Navigate to the specific design file where user details are listed.
Extract the email addresses directly visible in comments, metadata, or project settings.
Validate the exposed PII by cross-referencing with external sources or contacting affected users.
Exposure of Corporate & Institutional Emails
Figma’s security reputation is at stake. Users may perceive the platform as insecure, leading to significant trust erosion.
Loss of customer confidence. Organizations using Figma for design collaboration might reconsider their trust in the platform, fearing exposure of their employees’ emails.
Attackers can build verified email lists for further exploitation.
Phishing attacks: Malicious actors can craft targeted phishing campaigns against affected users.
Credential stuffing: If emails are associated with reused passwords, attackers could leverage credential stuffing techniques.
Social engineering: Attackers may exploit this information to manipulate users into disclosing sensitive credentials or information.
Regulatory non-compliance: The unauthorized exposure of PII can lead to potential legal and financial repercussions under data protection laws.
Emails from major organizations like Dell , the University of Massachusetts , and other big tech companies are exposed.
Exposed emails can be checked in for previous leaks.